A First Approach to Provide Anonymity in Attribute Certificates
نویسندگان
چکیده
This paper focus on two security services for internet applications: authorization and anonymity. Traditional authorization solutions are not very helpful for many of the Internet applications; however, attribute certificates proposed by ITU-T seems to be well suited and provide adequate solution. On the other hand, special attention is paid to the fact that many of the operations and transactions that are part of Internet applications can be easily recorded and collected. Consequently, anonymity has become a desirable feature to be added in many cases. In this work we propose a solution to enhance the X.509 attribute certificate in such a way that it becomes a conditionally anonymous attribute certificate. Moreover, we present a protocol to obtain such certificates in a way that respects users’ anonymity by using a fair blind signature scheme. We also show how to use such certificates and describe a few cases where problems could arise, identifying some open problems.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملAn artificial Neural Network approach to monitor and diagnose multi-attribute quality control processes
One of the existing problems of multi-attribute process monitoring is the occurrence of high number of false alarms (Type I error). Another problem is an increase in the probability of not detecting defects when the process is monitored by a set of independent uni-attribute control charts. In this paper, we address both of these problems and consider monitoring correlated multi-attributes proce...
متن کاملSecuring Identity Assignment Using Implicit Certificates in P2P Overlays
The security of the Peer-to-Peer (P2P) overlays networks has been questioned for years. Many works have been proposed to provide secure routing, anonymity, reputation systems, confidentiality, etc. However, the identity assignment has been less considered. These networks are designed so that each user has a unique identifier (nodeID), but the most of identity assignment systems allow malicious ...
متن کاملAnonymous attribute certificates based on traceable signatures
Purpose – To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can be disclosed or traced under certain conditions. Design/methodology/approach – The “traceable signature” scheme was used in conjunction with the “privilege management infrastructure”. Findings – The cryptographic primitive provides a suitable tool for anonymous and un...
متن کاملNonlinear Multi attribute Satisfaction Analysis (N-MUSA): Preference disaggregation approach to satisfaction
Nonlinear MUSA is an extension of MUSA, which employs a derived approach to analyze customer satisfaction and its determinants. It is a preference disaggregation approach, widely welcomed by scholars since 2002, following the principles of ordinal regression analysis. N-MUSA as a goal programing model, evaluates the level of satisfaction among some groups including customers, employees, etcete...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004